Sciweavers

75 search results - page 8 / 15
» Design, Implementation, and Performance Evaluation of a Dete...
Sort
View
SRDS
2005
IEEE
14 years 1 months ago
Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance
Quorum protocols offer several benefits when used to maintain replicated data but techniques for reducing overheads associated with them have not been explored in detail. It is d...
Lei Kong, Deepak J. Manohar, Mustaque Ahamad, Arun...
MOBICOM
2012
ACM
11 years 10 months ago
AutoMAC: rateless wireless concurrent medium access
Current wireless network design is built on the ethos of avoiding interference. In this paper we question this long-held design principle. We show that with appropriate design, su...
Aditya Gudipati, Stephanie Pereira, Sachin Katti
ICIP
2007
IEEE
14 years 2 months ago
Lifting-Based Directional DCT-Like Transform for Image Coding
Traditional 2D DCT implemented by separable 1D transform in horizontal and vertical directions does not take image orientation features in a local window into account. To improve ...
Hao Xu, Jizheng Xu, Feng Wu
AES
2008
Springer
133views Cryptology» more  AES 2008»
13 years 7 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar
DAC
2008
ACM
14 years 8 months ago
Run-time instruction set selection in a transmutable embedded processor
We are presenting a new concept of an application-specific processor that is capable of transmuting its instruction set according to non-predictive application behavior during run...
Jörg Henkel, Lars Bauer, Muhammad Shafique